Skip to content
arrow_back
search
ISM-1902 policy ASD Information Security Manual (ISM)

Apply Non-Critical Patches to Non-Internet Systems Promptly

Ensure non-critical security patches are applied within a month if no active threats are identified.

record_voice_over

Plain language

This control is about making sure that all non-critical updates for software on internal systems are applied within a month. It's crucial because if these updates aren't applied, even minor vulnerabilities can be exploited by cybercriminals, leading to data breaches or system downtime.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.
policy ASD Information Security Manual (ISM) ISM-1902
priority_high

Why it matters

Delaying vendor-rated non-critical patches on non-internet systems can allow internal attackers to exploit known flaws, escalating access and impacting integrity.

settings

Operational notes

Track vendor releases and apply non-critical OS patches to non-internet-facing workstations, servers and network devices within 30 days where no working exploits exist.

Mapping detail

Mapping

Direction

Controls